General Info

File name

399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91

Full analysis
https://app.any.run/tasks/8c0de6a1-b8a7-461c-a5dd-efdee762d1df
Verdict
Malicious activity
Analysis date
3/14/2019, 20:08:41
OS:
Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:

MIME:
application/x-dosexec
File info:
PE32 executable (GUI) Intel 80386, for MS Windows, PECompact2 compressed
MD5

763ac88f60a0ae62555313ddc770ede5

SHA1

7628217f28779e08cc1fbaab2e1c50234a17c3a0

SHA256

399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91

SSDEEP

384:FmpUto8E6qhIA8ZfiSM+3/marB4djzuf4uFfTlCTZ94GgR01eEe/tfF1XfvgmraJ:gpUt1E/8mS+amkLFRccny45nHguUL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distored by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.

Software environment set and analysis options

Launch configuration

Task duration
240 seconds
Additional time used
180 seconds
Fakenet option
off
Heavy Evaision option
off
MITM proxy
off
Route via Tor
off
Network geolocation
off
Privacy
Public submission
Autoconfirmation of UAC
on

Software preset

  • Internet Explorer 8.0.7601.17514
  • Adobe Acrobat Reader DC MUI (15.023.20070)
  • Adobe Flash Player 26 ActiveX (26.0.0.131)
  • Adobe Flash Player 26 NPAPI (26.0.0.131)
  • Adobe Flash Player 26 PPAPI (26.0.0.131)
  • Adobe Refresh Manager (1.8.0)
  • CCleaner (5.35)
  • FileZilla Client 3.36.0 (3.36.0)
  • Google Chrome (68.0.3440.106)
  • Google Update Helper (1.3.33.17)
  • Java 8 Update 92 (8.0.920.14)
  • Java Auto Updater (2.8.92.14)
  • Microsoft .NET Framework 4.6.1 (4.6.01055)
  • Microsoft Office Access MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Access Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Excel MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office OneNote MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Outlook MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office PowerPoint MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Professional 2010 (14.0.6029.1000)
  • Microsoft Office Proof (English) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (French) 2010 (14.0.6029.1000)
  • Microsoft Office Proof (Spanish) 2010 (14.0.6029.1000)
  • Microsoft Office Proofing (English) 2010 (14.0.6029.1000)
  • Microsoft Office Publisher MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Shared Setup Metadata MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Office Single Image 2010 (14.0.6029.1000)
  • Microsoft Office Word MUI (English) 2010 (14.0.6029.1000)
  • Microsoft Visual C++ 2008 Redistributable - x86 9.0.30729.6161 (9.0.30729.6161)
  • Microsoft Visual C++ 2010 x86 Redistributable - 10.0.40219 (10.0.40219)
  • Microsoft Visual C++ 2013 Redistributable (x86) - 12.0.30501 (12.0.30501.0)
  • Microsoft Visual C++ 2013 x86 Additional Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2013 x86 Minimum Runtime - 12.0.21005 (12.0.21005)
  • Microsoft Visual C++ 2017 Redistributable (x86) - 14.15.26706 (14.15.26706.0)
  • Microsoft Visual C++ 2017 x86 Additional Runtime - 14.15.26706 (14.15.26706)
  • Microsoft Visual C++ 2017 x86 Minimum Runtime - 14.15.26706 (14.15.26706)
  • Mozilla Firefox 61.0.2 (x86 en-US) (61.0.2)
  • Notepad++ (32-bit x86) (7.5.1)
  • Opera 12.15 (12.15.1748)
  • Skype version 8.29 (8.29)
  • VLC media player (2.2.6)
  • WinRAR 5.60 (32-bit) (5.60.0)

Hotfixes

  • Client LanguagePack Package
  • Client Refresh LanguagePack Package
  • CodecPack Basic Package
  • Foundation Package
  • IE Troubleshooters Package
  • InternetExplorer Optional Package
  • KB2534111
  • KB2999226
  • KB976902
  • LocalPack AU Package
  • LocalPack CA Package
  • LocalPack GB Package
  • LocalPack US Package
  • LocalPack ZA Package
  • ProfessionalEdition
  • UltimateEdition

Behavior activities

MALICIOUS SUSPICIOUS INFO
Actions looks like stealing of personal data
  • service.exe (PID: 3068)
Writes to a start menu file
  • 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe (PID: 3360)
  • service.exe (PID: 3068)
  • winlogon.exe (PID: 3356)
Changes the autorun value in the registry
  • winlogon.exe (PID: 3356)
  • service.exe (PID: 3068)
Changes the login/logoff helper path in the registry
  • service.exe (PID: 3068)
  • winlogon.exe (PID: 3356)
Creates files in the user directory
  • service.exe (PID: 3068)
  • 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe (PID: 3360)
Suspicious files were dropped or overwritten
  • service.exe (PID: 3068)
  • 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe (PID: 3360)
  • winlogon.exe (PID: 3356)
Executable content was dropped or overwritten
  • 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe (PID: 3360)
  • service.exe (PID: 3068)
  • winlogon.exe (PID: 3356)
Starts itself from another location
  • 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe (PID: 3360)

No info indicators.

Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

Static information

TRiD
.exe
|   Win32 Executable (generic) (52.9%)
.exe
|   Generic Win/DOS Executable (23.5%)
.exe
|   DOS Executable Generic (23.5%)
EXIF
EXE
MachineType:
Intel 386 or later, and compatibles
TimeStamp:
2001:04:21 20:06:18+02:00
PEType:
PE32
LinkerVersion:
6
CodeSize:
73728
InitializedDataSize:
20480
UninitializedDataSize:
null
EntryPoint:
0x1189
OSVersion:
4
ImageVersion:
1
SubsystemVersion:
4
Subsystem:
Windows GUI
Summary
Architecture:
IMAGE_FILE_MACHINE_I386
Subsystem:
IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date:
21-Apr-2001 18:06:18
DOS Header
Magic number:
MZ
Bytes on last page of file:
0x0090
Pages in file:
0x0003
Relocations:
0x0000
Size of header:
0x0004
Min extra paragraphs:
0x0000
Max extra paragraphs:
0xFFFF
Initial SS value:
0x0000
Initial SP value:
0x00B8
Checksum:
0x0000
Initial IP value:
0x0000
Initial CS value:
0x0000
Overlay number:
0x0000
OEM identifier:
0x0000
OEM information:
0x0000
Address of NE header:
0x000000B8
PE Headers
Signature:
PE
Machine:
IMAGE_FILE_MACHINE_I386
Number of sections:
2
Time date stamp:
21-Apr-2001 18:06:18
Pointer to Symbol Table:
0x00000000
Number of symbols:
0
Size of Optional Header:
0x00E0
Characteristics
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_RELOCS_STRIPPED
Sections
Name Virtual Address Virtual Size Raw Size Charateristics Entropy
.text 0x00001000 0x00017000 0x00004A00 IMAGE_SCN_CNT_CODE,IMAGE_SCN_CNT_INITIALIZED_DATA,IMAGE_SCN_MEM_EXECUTE,IMAGE_SCN_MEM_READ,IMAGE_SCN_MEM_WRITE 7.95557
.rsrc 0x00018000 0x0002E400 0x00027400 IMAGE_SCN_CNT_CODE,IMAGE_SCN_MEM_EXECUTE,IMAGE_SCN_MEM_READ,IMAGE_SCN_MEM_WRITE 0.635661
Resources
1

2

3

Imports
    kernel32.dll

Exports

    No exports.

Screenshots

Processes

Total processes
32
Monitored processes
3
Malicious processes
3
Suspicious processes
0

Behavior graph

+
drop and start drop and start start 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe service.exe winlogon.exe
Specs description
Program did not start
Integrity level elevation
Task сontains an error or was rebooted
Process has crashed
Task contains several apps running
Executable file was dropped
Debug information is available
Process was injected
Network attacks were detected
Application downloaded the executable file
Actions similar to stealing personal data
Behavior similar to exploiting the vulnerability
Inspected object has sucpicious PE structure
File is detected by antivirus software
CPU overrun
RAM overrun
Process starts the services
Process was added to the startup
Behavior similar to spam
Low-level access to the HDD
Probably Tor was used
System was rebooted
Connects to the network
Known threat

Process information

Click at the process to see the details.

PID
3360
CMD
"C:\Users\admin\AppData\Local\Temp\399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe"
Path
C:\Users\admin\AppData\Local\Temp\399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
Indicators
Parent process
––
User
admin
Integrity Level
MEDIUM
Exit code
0
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\local\temp\399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sxs.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\profapi.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\shdocvw.dll
c:\windows\system32\urlmon.dll
c:\windows\system32\wininet.dll
c:\windows\system32\iertutil.dll
c:\windows\system32\crypt32.dll
c:\windows\system32\msasn1.dll
c:\users\admin\appdata\roaming\microsoft\windows\templates\o74747z\service.exe
c:\windows\system32\twext.dll
c:\windows\system32\cscui.dll
c:\windows\system32\cscdll.dll
c:\windows\system32\cscapi.dll
c:\windows\system32\cryptsp.dll
c:\windows\system32\rsaenh.dll
c:\windows\system32\rpcrtremote.dll
c:\windows\system32\userenv.dll
c:\program files\winrar\rarext.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.7601.17514_none_ec83dffa859149af\comctl32.dll
c:\windows\winsxs\x86_microsoft.windows.gdiplus_6595b64144ccf1df_1.1.7601.17514_none_72d18a4386696c80\gdiplus.dll
c:\windows\system32\msimg32.dll
c:\windows\system32\api-ms-win-core-synch-l1-2-0.dll
c:\windows\system32\windowscodecs.dll
c:\windows\system32\uxtheme.dll
c:\windows\system32\ntshrui.dll
c:\windows\system32\srvcli.dll
c:\windows\system32\slc.dll
c:\windows\system32\netutils.dll
c:\windows\system32\syncui.dll
c:\windows\system32\synceng.dll
c:\windows\system32\linkinfo.dll
c:\program files\notepad++\nppshell_06.dll
c:\windows\system32\acppage.dll
c:\windows\system32\sfc.dll
c:\windows\system32\sfc_os.dll
c:\windows\system32\msi.dll
c:\windows\system32\version.dll
c:\windows\system32\wer.dll
c:\windows\system32\devrtl.dll
c:\users\admin\appdata\roaming\microsoft\windows\templates\o74747z\winlogon.exe

PID
3068
CMD
"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\O74747Z\service.exe"
Path
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\O74747Z\service.exe
Indicators
Parent process
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\roaming\microsoft\windows\templates\o74747z\service.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sxs.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\rasapi32.dll
c:\windows\system32\rasman.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\nsi.dll
c:\windows\system32\rtutils.dll

PID
3356
CMD
"C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\O74747Z\winlogon.exe"
Path
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\O74747Z\winlogon.exe
Indicators
Parent process
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
User
admin
Integrity Level
MEDIUM
Version:
Company
Description
Version
Modules
Image
c:\users\admin\appdata\roaming\microsoft\windows\templates\o74747z\winlogon.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\lpk.dll
c:\windows\system32\user32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\imm32.dll
c:\windows\system32\msctf.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\cryptbase.dll
c:\windows\system32\sxs.dll
c:\windows\system32\clbcatq.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\setupapi.dll
c:\windows\system32\cfgmgr32.dll
c:\windows\system32\devobj.dll
c:\windows\system32\propsys.dll
c:\windows\system32\ntmarta.dll
c:\windows\system32\wldap32.dll
c:\windows\system32\sspicli.dll

Registry activity

Total events
1763
Read events
936
Write events
827
Delete events
0

Modification events

PID
Process
Operation
Key
Name
Value
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
write
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\untukmu\version
me
4
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\TUX\Path
1
M46840
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\TUX\Path
2
O74747Z
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\TUX\Path
3
X62445go
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\TUX\biang
1
228407
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\TUX\biang
2
866388
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\TUX\biang
3
656174
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\TUX\biang
4
67032
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\TUX\biang
5
121353
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
UNCAsIntranet
0
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
AutoDetect
1
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
write
HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
LanguageList
en-US
3068
service.exe
write
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\untukmu\version
me
4
3068
service.exe
write
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\noGods\appActive
service.exe
®Ãû–Æó¯|Ð
3068
service.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\service_RASAPI32
EnableFileTracing
0
3068
service.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\service_RASAPI32
EnableConsoleTracing
0
3068
service.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\service_RASAPI32
FileTracingMask
4294901760
3068
service.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\service_RASAPI32
ConsoleTracingMask
4294901760
3068
service.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\service_RASAPI32
MaxFileSize
1048576
3068
service.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\service_RASAPI32
FileDirectory
%windir%\tracing
3068
service.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState
FullPath
1
3068
service.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
T1468388TT4
C:\Windows\system32\228407656174l.exe
3068
service.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
T47Z284
C:\Windows\sa-866388.exe
3068
service.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
explorer.exe, "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\O74747Z\TuxO74747Z.exe"
3068
service.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
C:\Windows\system32\userinit.exe , "C:\Windows\M46840\Ja67032bLay.com"
3068
service.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
HideFileExt
1
3068
service.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Hidden
0
3068
service.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
ShowSuperHidden
0
3068
service.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\scrfile
File Folder
3068
service.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Common Startup
C:\Windows\system32\X62445go
3068
service.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden
UncheckedValue
0
3356
winlogon.exe
write
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\untukmu\version
me
4
3356
winlogon.exe
write
HKEY_CURRENT_USER\Software\VB and VBA Program Settings\noGods\appActive
winlogon.exe
œ±é„´áj¾
3356
winlogon.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\CabinetState
FullPath
1
3356
winlogon.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
T1468388TT4
C:\Windows\system32\228407656174l.exe
3356
winlogon.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
T47Z284
C:\Windows\sa-866388.exe
3356
winlogon.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Shell
explorer.exe, "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\O74747Z\TuxO74747Z.exe"
3356
winlogon.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon
Userinit
C:\Windows\system32\userinit.exe , "C:\Windows\M46840\Ja67032bLay.com"
3356
winlogon.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
HideFileExt
1
3356
winlogon.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
Hidden
0
3356
winlogon.exe
write
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced
ShowSuperHidden
0
3356
winlogon.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\scrfile
File Folder
3356
winlogon.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Common Startup
C:\Windows\system32\X62445go
3356
winlogon.exe
write
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\SuperHidden
UncheckedValue
0

Files activity

Executable files
13
Suspicious files
0
Text files
2
Unknown types
0

Dropped files

PID
Process
Filename
Type
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\O74747Z\TuxO74747Z.exe
executable
MD5: 763ac88f60a0ae62555313ddc770ede5
SHA256: 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91
3068
service.exe
C:\Users\admin\Downloads\RaHasIA .exe
executable
MD5: 763ac88f60a0ae62555313ddc770ede5
SHA256: 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\O74747Z\service.exe
executable
MD5: 763ac88f60a0ae62555313ddc770ede5
SHA256: 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91
3068
service.exe
C:\Users\admin\AppData\Roaming\Skype\shared_httpfe\Titip Folder Jangan DiHapus .exe
executable
MD5: 763ac88f60a0ae62555313ddc770ede5
SHA256: 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91
3356
winlogon.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd
executable
MD5: 763ac88f60a0ae62555313ddc770ede5
SHA256: 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91
3068
service.exe
C:\Users\admin\AppData\Local\Google\Chrome\User Data\Default\Download Service\TutoriaL HAcking .exe
executable
MD5: 763ac88f60a0ae62555313ddc770ede5
SHA256: 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91
3068
service.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd
executable
MD5: 763ac88f60a0ae62555313ddc770ede5
SHA256: 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\O74747Z\winlogon.exe
executable
MD5: 763ac88f60a0ae62555313ddc770ede5
SHA256: 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91
3360
399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\startup\sql.cmd
executable
MD5: 763ac88f60a0ae62555313ddc770ede5
SHA256: 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91
3068
service.exe
C:\Users\Public\Downloads\New mp3 BaraT !! .exe
executable
MD5: 763ac88f60a0ae62555313ddc770ede5
SHA256: 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91
3356
winlogon.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\O74747Z\TuxO74747Z.exe
executable
MD5: 763ac88f60a0ae62555313ddc770ede5
SHA256: 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91
3068
service.exe
C:\Users\admin\AppData\Roaming\Skype\shared_dynco\TutoriaL HAcking .exe
executable
MD5: 763ac88f60a0ae62555313ddc770ede5
SHA256: 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91
3068
service.exe
C:\Users\admin\AppData\Roaming\Microsoft\Windows\Templates\O74747Z\TuxO74747Z.exe
executable
MD5: 763ac88f60a0ae62555313ddc770ede5
SHA256: 399c4bc47a977d35535809db24548f33b5c50f915c20a5223adb0ad9d6784b91
3356
winlogon.exe
C:\Users\admin\AppData\Local\VirtualStore\Windows\[TheMoonlight].txt
text
MD5: 68c7836c8ff19e87ca33a7959a2bdff5
SHA256: 883b19ec550f7ddb1e274a83d58d66c771ab10fefd136bab79483f2eb84e7fec
3068
service.exe
C:\Users\admin\AppData\Local\VirtualStore\Windows\[TheMoonlight].txt
text
MD5: 68c7836c8ff19e87ca33a7959a2bdff5
SHA256: 883b19ec550f7ddb1e274a83d58d66c771ab10fefd136bab79483f2eb84e7fec

Find more information of the staic content and download it at the full report

Network activity

HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

No network activity.

Debug output strings

No debug info.